Domain 2 Threat Landscape - Threats

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts related to risk analysis, threats, and threat actors discussed in the lecture.

Last updated 7:38 PM on 12/8/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

17 Terms

1
New cards

Threat

Any potential danger that could exploit vulnerabilities in an environment to compromise or damage an asset.

2
New cards

Internal Threats

Threats that originate from within an organization, such as accidental disclosures or actions by a malicious insider.

3
New cards

External Threats

Threats that originate from outside the organization, including natural disasters and attacks from individuals or groups.

4
New cards

Script Kitties

Individuals, often less skilled, who use automated tools to exploit systems, generally driven by curiosity or mischief.

5
New cards

Hacktivists

Individuals who hack for political motives, aiming to raise awareness or make a statement.

6
New cards

Cybercrime

Criminal activities conducted via the internet for the purpose of financial gain.

7
New cards

Cyberterrorism

Attacks funded by nation states aimed at causing disruption or harm to target systems.

8
New cards

Advanced Persistent Threats (APTs)

Highly skilled attackers who maintain a persistent presence in a target environment, using sophisticated techniques to avoid detection.

9
New cards

Initial Compromise

The first step in an APT attack where the attacker gains access to the target environment.

10
New cards

Privilege Escalation

The process of an attacker obtaining higher access rights within a system after initial entry.

11
New cards

Social Engineering

Manipulative techniques aimed at persuading individuals to divulge confidential information.

12
New cards

Zero-Day Exploit

A previously unknown vulnerability that attackers can exploit before it is patched.

13
New cards

Lateral Movement

The technique used by attackers to move through a network after gaining access to find additional targets.

14
New cards

Persistence in Cyber Attacks

The capability of an attacker to maintain their presence in a system over time to exploit vulnerabilities repeatedly.

15
New cards

Vishing

Voice phishing, a type of social engineering attack conducted over the phone.

16
New cards

Smishing

SMS phishing, where attackers use text messages to trick individuals into revealing personal information.

17
New cards

Third Party Compromise

When attackers target service providers with weaker security to gain access to a client's environment.